General

  • Target

    insert.exe

  • Size

    303KB

  • Sample

    240226-pt5ymaea4w

  • MD5

    75f4a7eb42956cce075268869f74c146

  • SHA1

    34f40b2238734969022044e2315b9727e2862c5a

  • SHA256

    3d19792141d8893427962d74a10d815cbd2c8c5eee06d0605b58f98f21a69d21

  • SHA512

    4b102bc72111035b9a1f2848a4edb1c80561882e88e9165e4f3d0b4453c5d5c543f1ca1b7d2e9bcb31b8afd75dddfb0d87174f917fa13d7c279415560e4ee2b1

  • SSDEEP

    6144:9b4T6MDdbICydeBrdcQG3yf51+z6jmA1D0Oy3:9bGhcQG3yB1mY1DU3

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1211399238731304960/uTJAiSYIaZ0ii5iUD_ZljLDK4lGwoOh_fT-W7Z6vwn1fn5M28JYj1RRD6L3bDd7OYqs8

Targets

    • Target

      insert.exe

    • Size

      303KB

    • MD5

      75f4a7eb42956cce075268869f74c146

    • SHA1

      34f40b2238734969022044e2315b9727e2862c5a

    • SHA256

      3d19792141d8893427962d74a10d815cbd2c8c5eee06d0605b58f98f21a69d21

    • SHA512

      4b102bc72111035b9a1f2848a4edb1c80561882e88e9165e4f3d0b4453c5d5c543f1ca1b7d2e9bcb31b8afd75dddfb0d87174f917fa13d7c279415560e4ee2b1

    • SSDEEP

      6144:9b4T6MDdbICydeBrdcQG3yf51+z6jmA1D0Oy3:9bGhcQG3yB1mY1DU3

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks